IT Management  >   Systems Operations  >  

Systems Security

RSS Feed   
Systems Security Reports
 
The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate

MSPs: How to Stop Chasing False Positives and Grow Your Business
sponsored by Malwarebytes
DATA SHEET: Check out this solution brief to learn how Malwarebytes mitigates false positives for MSPs through a multi-layered protection strategy while also providing informed telemetry, and threat intelligence.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Malwarebytes

Security Think Tank Pt.2 - 2020 bought us universal remote working. So what next?...
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

Royal Holloway: Testing antivirus efficacy in Linux
sponsored by ComputerWeekly.com
EZINE: Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
Posted: 25 Mar 2021 | Published: 25 Mar 2021

ComputerWeekly.com

Strengthen your Cyberdefense Strategy
sponsored by Rubrik
EGUIDE: Ransomware attacks have become one of the most significant cyberthreats facing today’s enterprises – which is why we crafted this e-guide, which provides step-by-step insight for preventing and removing ransomware. Access this e-guide by taking this short survey, and be entered to win a $100 Amazon gift card.
Posted: 22 Sep 2021 | Published: 22 Sep 2021

TOPICS:  Security
Rubrik

Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, our buyer's guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.
Posted: 16 Aug 2021 | Published: 17 Aug 2021

ComputerWeekly.com

It Leads The Way: How The Pandemic Empowered It
sponsored by Tanium
WHITE PAPER: Once you realize you can move all your users to WFH in days instead of years, you start to wonder what else you can do quickly. If massive changes are possible, how should IT organizations budget for 2021 and 2022? Read on to see what C-level decision-makers think on the matter.
Posted: 24 Mar 2021 | Published: 24 Mar 2021

TOPICS:  Security
Tanium

Security Think Tank: Biden's Cyber Security Plan
sponsored by ComputerWeekly.com
EGUIDE: As Biden sets out his agenda for the next four years, the Computer Weekly Security Think Tank considers the opportunities for renewed international collaboration on cyber security, what aspects of cyber policy Biden would be best advised to focus on, and asks how the industry can better make its voice heard.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

ComputerWeekly.com

Leve raging AI to Automate Vulnerability Management
sponsored by Dell SecureWorks
DATA SHEET: Today’s organizations need vulnerability management (VM) solutions that are built to maximize risk reduction. With the power of ML, these same organizations can minimize the manual burden on InfoSec and IT operations teams. Download this data sheet to explore how Secureworks’ VM solution strives to do all this and more.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Dell SecureWorks

Verticalization and Cybersecurity: The Benefits of Specializing for Security
sponsored by ConnectWise
WEBCAST: Jump into this webinar and Q&A to join Jay Ryer and David Powell from ConnectWise as they cover how industry-specific knowledge can put MSPs in different positions with their clients, as well as why cybersecurity is evolving from an IT issue to a business one.
Posted: 04 May 2021 | Premiered: May 4, 2021

TOPICS:  Security
ConnectWise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences